Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:
Eye Protection Where an employee is required by the College or by legislation, in order to perform his/her duties, to acquire and wear prescription eye protection, the employee shall provide the College with proof of purchase by March 1 each year and the College shall reimburse to such employee, on the first pay day of April in each year, up to a maximum of twenty dollars ($20.00); in situations other than the foregoing, the College, may in its discretion, (which discretion shall not be unreasonably exercised) reimburse such expense where it is recommended by the health and safety committee constituted under the Occupational Health and Safety Act.
Engineering Forest Service completed survey and design for Specified Roads prior to timber sale advertisement, unless otherwise shown in A8 or Purchaser survey and design are specified in A7. On those roads for which Forest Service completes the design during the contract, the design quantities shall be used as the basis for revising estimated costs stated in the Schedule of Items and adjusting Timber Sale Account. (a) A7 to show Purchaser’s performance responsibility. (b) The Schedule of Items to include costs of survey and design, as provided under B5.24, and adjust Timber Sale Account, as provided in B5.
Procurement All goods, works and services required for the Project and to be financed out of the proceeds of the Financing shall be procured in accordance with the provisions of Section III of Schedule 2 to the Financing Agreement.
Professional Engineering and Architect’s Services Professional Engineering and Architect’s Services are not permitted to be provided under this Agreement. Texas statutes prohibit the procurement of Professional Engineering and Architect’s Services through a cooperative agreement.
System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.
Value Engineering The Supplier may prepare, at its own cost, a value engineering proposal at any time during the performance of the contract. The value engineering proposal shall, at a minimum, include the following; a) the proposed change(s), and a description of the difference to the existing contract requirements; b) a full cost/benefit analysis of the proposed change(s) including a description and estimate of costs (including life cycle costs) the Procuring Entity may incur in implementing the value engineering proposal; and c) a description of any effect(s) of the change on performance/functionality.
Reverse Engineering The Customer must not reverse assemble or reverse compile or directly or indirectly allow or cause a third party to reverse assemble or reverse compile the whole or any part of the software or any products supplied as a part of the Licensed System.
Preservation, Maintenance, and Protection of the Property Inspections. Borrower will not destroy, damage, or impair the Property, allow the Property to deteriorate, or commit waste on the Property. Whether or not Borrower is residing in the Property, Borrower must maintain the Property in order to prevent the Property from deteriorating or decreasing in value due to its condition. Unless Lender determines pursuant to Section 5 that repair or restoration is not economically feasible, Borrower will promptly repair the Property if damaged to avoid further deterioration or damage. If insurance or condemnation proceeds are paid to Lender in connection with damage to, or the taking of, the Property, Borrower will be responsible for repairing or restoring the Property only if Xxxxxx has released proceeds for such purposes. Lender may disburse proceeds for the repairs and restoration in a single payment or in a series of progress payments as the work is completed, depending on the size of the repair or restoration, the terms of the repair agreement, and whether Borrower is in Default on the Loan. Lender may make such disbursements directly to Borrower, to the person repairing or restoring the Property, or payable jointly to both. If the insurance or condemnation proceeds are not sufficient to repair or restore the Property, Borrower remains obligated to complete such repair or restoration. Lender may make reasonable entries upon and inspections of the Property. If Lender has reasonable cause, Xxxxxx may inspect the interior of the improvements on the Property. Lender will give Borrower notice at the time of or prior to such an interior inspection specifying such reasonable cause.
Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.